SlideShare a Scribd company logo
1 of 47
Download to read offline
Representing and Querying Norm Statesā€Ø
Using Temporal Ontology-Based Data Access
Evellin Cardoso, Marco Montali, Diego Calvaneseā€Ø
Free University of Bozen-Bolzano, Italy
model-
driven
data-
driven
digital enterprise
model-
driven
data-
driven
Governance
Workforce
Governance
Governancemodel-
driven
data-
driven
Governance
WorkforceWorkforce
contract
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
z
Is delivery 123 still
pending?
Which
commitments did
we violate in 2018?
customer
manager
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
z
Is delivery 123 still
pending?
Which
commitments did
we violate in 2018?
customer
manager
Problem #1
How to represent
relational
normative primitives
and their evolution
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
Is delivery 123 still
pending?
Which
commitments did
we violate in 2018?
customer
managerqueries
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
norm
states
Is delivery 123 still
pending?
Which
commitments did
we violate in 2019?
customer
managerqueries
extension of
answers
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
norm
states
Is delivery 123 still
pending?
Which
commitments did
we violate in 2019?
customer
managerqueries
extension of
answers
Problem #2
How to compute
norm instances and
their states from
legacy data
Governancemodel-
driven
data-
driven
Governance
Workforce
contract
norm
states
Is delivery 123 still
pending?
Which
commitments did
we violate in 2019?
customer
managerqueries
extension of
answers
Problem #2
How to compute
norm instances and
their states from
legacy relational data
without materializing
Outline
1. Example (data consent)

2. The QUEN framework as a black box

3. The QUEN framework as a white box
Example: ā€Ø
access consent to patient data
patient health vault provider third-parties
Example: ā€Ø
access consent to patient data
patient health vault provider third-parties
allow
disclosure token
Allowed(pid,hid,discid,tpid,t)
Example: ā€Ø
access consent to patient data
patient health vault provider third-parties
send creds
disclosure token
allow
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
Example: ā€Ø
access consent to patient data
patient health vault provider third-parties
send creds
disclosure token
allow
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
ReqData(tpid,hid,reqid,discid,t)
request
Example: ā€Ø
access consent to patient data
patient health vault provider third-parties
send creds
disclosure token
allow
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
request
ReqData(tpid,hid,reqid,discid,t)
Accessed(tpid,hid,reqid,discid,t)
access
Example: ā€Ø
access consent to patient data
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
ReqData(tpid,hid,reqid,discid,t)
Accessed(tpid,hid,reqid,discid,t)
Who are the involved agents?

Where is the notion of ā€œdisclose authorizationā€? How many
authorizations have been created? What is their current status?

Is third-party xyz authorised now to access certain data?
QUEN in a nutshell
ā€¢ Full relational (ļ¬rst-order) modeling of norms.

ā€¢ Three conceptual layers:

1. Ontological layer of norms: norms as explicit relations.
2. Norm state evolution: declarative speciļ¬cation of norm
state transitions as induced by the raw database facts.

3. Legacy relational database: tuples with timestamps as
implicit events.

ā€¢ ā€œVirtual norm storeā€: 

ā€¢ data; 

ā€¢ queries and answers.
QUEN in a nutshell
ā€¢ Full relational (ļ¬rst-order) modeling of norms.

ā€¢ Three conceptual layers:

1. Ontological layer of norms: norms as explicit relations.
2. Norm state evolution: declarative speciļ¬cation of norm
state transitions as induced by the raw facts in the data

3. Legacy relational database: tuples with timestamps as
implicit events.

ā€¢ ā€œVirtual norm storeā€: 

ā€¢ data; 

ā€¢ queries and answers.
Upper knowledge
- crt: timestamp
- ext: timestamp [0..1]
- det: timestamp [0..1]
- dit: timestamp [0..1]
Normative
Primitive
Authorization
Prohibition
Power
is expector for
Commitment
Agent
is expectee for
Thing
1
1
*
* * 1
targets
- vit: timestamp [0..1]
Violable Normative
Primitive
Static Dynamic
Upper knowledge
- crt: timestamp
- ext: timestamp [0..1]
- det: timestamp [0..1]
- dit: timestamp [0..1]
Normative
Primitive
Authorization
Prohibition
Power
is expector for
Commitment
Agent
is expectee for
Thing
1
1
*
* * 1
targets
- vit: timestamp [0..1]
Violable Normative
Primitive
Static Dynamic
created
detachedexpired
dischargedviolated
create
when ante detach
when never ante
expire
when cons
discharge
when cons dischargewhen never cons violate
Figure 1: Lifecycle of norm types (from [9]). The violated state e
only for prohibition and commitment.
a timestamp column, and whose tuples record the diffe
instances recorded in the system for that event.
Example 1 (Inspired from [9]). The following informa
schema captures three event types related to the request
access to patient data within a sanitary organization, where
Upper knowledge
- crt: timestamp
- ext: timestamp [0..1]
- det: timestamp [0..1]
- dit: timestamp [0..1]
Normative
Primitive
Authorization
Prohibition
Power
is expector for
Commitment
Agent
is expectee for
Thing
1
1
*
* * 1
targets
- vit: timestamp [0..1]
Violable Normative
Primitive
Static Dynamic
Step 1/3: Domain-speciļ¬c norm types
- crt: timestamp
- ext: timestamp [0..1]
- det: timestamp [0..1]
- dit: timestamp [0..1]
Normative
Primitive
Authorization
Prohibition
Power
Third
Party
HealthVault
Provider
is expector for
Commitment
Disclosure
Auth
Agent
is expectee for
given by
used by attached to
Disclosure
Token
Thing
1
1
*
* * 1
targets
- vit: timestamp [0..1]
Violable Normative
Primitive
1
1
*
*
0..1 1
Patient
emits1
*
Step 1/3: Domain-speciļ¬c norm types
- crt: timestamp
- ext: timestamp [0..1]
- det: timestamp [0..1]
- dit: timestamp [0..1]
Normative
Primitive
Authorization
Prohibition
Power
Third
Party
HealthVault
Provider
is expector for
Commitment
Disclosure
Auth
Agent
is expectee for
given by
used by attached to
Disclosure
Token
Thing
1
1
*
* * 1
targets
- vit: timestamp [0..1]
Violable Normative
Primitive
1
1
*
*
0..1 1
Patient
emits1
*
- crt: timestamp
- ext: timestamp [0..1]
- det: timestamp [0..1]
- dit: timestamp [0..1]
Normative
Primitive
Authorization
Prohibition
Power
Third
Party
HealthVault
Provider
is expector for
Commitment
Disclosure
Auth
Agent
is expectee for
given by
used by attached to
Disclosure
Token
Thing
1
1
*
* * 1
targets
- vit: timestamp [0..1]
Violable Normative
Primitive
1
1
*
*
0..1 1
Patient
emits1
*
Step 2/3: Norm State Transitions
We take inspiration from Custard [Chopra and Singh, AAMAS 2016].

Each norm type N in the lower ontology comes with a
corresponding QUEN speciļ¬cation:

and is a sub-relation of the expector relation in On (thus
qualifying the domain-speciļ¬c expector for N);
ā€¢ Rc be a domain-speciļ¬c relation that is attached to N
and is a sub-relation of the expectee relation in On (thus
qualifying the domain-speciļ¬c expectee for N);
ā€¢ Rt be a domain-speciļ¬c relationship that is attached to
N and is a sub-relation of the target relation in On (thus
qualifying the domain-speciļ¬c target for N).
A QUEN lifecycle speciļ¬cation for this combination of ele-
ments has the following form:
T N Rd d Rc c Rt o
create Qcr
(d, c, o, tcr)
expire Qex
d,c,o,tcr
(tex)
detach Qde
d,c,o,tcr
(tde)
discharge Qdi
d,c,o,tcr,tde
(tdi)
[violate Qvi
d,c,o,tcr,tde
(tvi) ]
where the last line is only present if T āˆˆ
We take inspiration from Custard [Chopra and Singh, AAMAS 2016].

Each norm type N in the lower ontology comes with a
corresponding QUEN speciļ¬cation:

and is a sub-relation of the expector relation in On (thus
qualifying the domain-speciļ¬c expector for N);
ā€¢ Rc be a domain-speciļ¬c relation that is attached to N
and is a sub-relation of the expectee relation in On (thus
qualifying the domain-speciļ¬c expectee for N);
ā€¢ Rt be a domain-speciļ¬c relationship that is attached to
N and is a sub-relation of the target relation in On (thus
qualifying the domain-speciļ¬c target for N).
A QUEN lifecycle speciļ¬cation for this combination of ele-
ments has the following form:
T N Rd d Rc c Rt o
create Qcr
(d, c, o, tcr)
expire Qex
d,c,o,tcr
(tex)
detach Qde
d,c,o,tcr
(tde)
discharge Qdi
d,c,o,tcr,tde
(tdi)
[violate Qvi
d,c,o,tcr,tde
(tvi) ]
where the last line is only present if T āˆˆ
Static/dynamic KB
Relational DB
Step 2/3: Norm Lifecycle
Third
Party
HealthVault
Provider
Disclosure
Auth
given by
used by attached to
Disclosure
Token
1
1
*
*
0..1 1
Patient
emits1
*
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
ReqData(tpid,hid,reqid,discid,t)
Accessed(tpid,hid,reqid,discid,t)
Step 2/3: Norm Lifecycle
Third
Party
HealthVault
Provider
Disclosure
Auth
given by
used by attached to
Disclosure
Token
1
1
*
*
0..1 1
Patient
emits1
*
authorization DisclosureAuth used by tp given by h attached to d
create SELECT c.tpid AS tp, c.hid AS h, c.discid AS d, c.t AS tcr
FROM SentCred c, Allowed a WHERE c.discid = a.discid AND c.tpid = a.tpid AND c.hid = a.hid
detach SELECT r.t AS tde FROM ReqData r WHERE r.discid = d AND r.t > tcr
discharge SELECT a.t AS tdi FROM Accessed a WHERE a.discid = d AND a.t ā‰„ tde + 1 AND a.t ā‰¤ tde + 10
Figure 4: QUEN lifecycle speciļ¬cation of the disclosure authorization on top of the database schema of Example 1.
where object constructors simply use (abbreviations of) the
names of the corresponding endpoint classes. Notice that
this mapping also implicitly populate the Patient class with
pat(pid), given that the domain of emits is Patient as dictated
by the ontology. ā–¹
D. Putting Everything Together
A. From Lifecycle Speciļ¬cations to Mappings
As a preliminary step for the translation, we need to d
how a query with parameters can be suitably merge w
query providing those parameters, so as to obtain a stan
SQL query as result. This is done by simply computing
join (in the standard SQL sense).
Speciļ¬cally, let Q1
(āƒ—x, t1) be a query without paramete
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
ReqData(tpid,hid,reqid,discid,t)
Accessed(tpid,hid,reqid,discid,t)
Step 2/3: Norm Lifecycle
Third
Party
HealthVault
Provider
Disclosure
Auth
given by
used by attached to
Disclosure
Token
1
1
*
*
0..1 1
Patient
emits1
*
authorization DisclosureAuth used by tp given by h attached to d
create SELECT c.tpid AS tp, c.hid AS h, c.discid AS d, c.t AS tcr
FROM SentCred c, Allowed a WHERE c.discid = a.discid AND c.tpid = a.tpid AND c.hid = a.hid
detach SELECT r.t AS tde FROM ReqData r WHERE r.discid = d AND r.t > tcr
discharge SELECT a.t AS tdi FROM Accessed a WHERE a.discid = d AND a.t ā‰„ tde + 1 AND a.t ā‰¤ tde + 10
Figure 4: QUEN lifecycle speciļ¬cation of the disclosure authorization on top of the database schema of Example 1.
where object constructors simply use (abbreviations of) the
names of the corresponding endpoint classes. Notice that
this mapping also implicitly populate the Patient class with
pat(pid), given that the domain of emits is Patient as dictated
by the ontology. ā–¹
D. Putting Everything Together
A. From Lifecycle Speciļ¬cations to Mappings
As a preliminary step for the translation, we need to d
how a query with parameters can be suitably merge w
query providing those parameters, so as to obtain a stan
SQL query as result. This is done by simply computing
join (in the standard SQL sense).
Speciļ¬cally, let Q1
(āƒ—x, t1) be a query without paramete
SentCred(hid,tpid,discid,t)
Allowed(pid,hid,discid,tpid,t)
ReqData(tpid,hid,reqid,discid,t)
Accessed(tpid,hid,reqid,discid,t)
Step 2/3: Norm Lifecycle
Step 3/3: Add explicit mappings
Third
Party
HealthVault
Provider
Disclosure
Auth
given by
used by attached to
Disclosure
Token
1
1
*
*
0..1 1
Patient
emits1
*
Allowed(pid,hid,discid,tpid,t)
Step 3/3: Add explicit mappings
Third
Party
HealthVault
Provider
Disclosure
Auth
given by
used by attached to
Disclosure
Token
1
1
*
*
0..1 1
Patient
emits1
*
Allowed(pid,hid,discid,tpid,t)
Step 3/3: Add explicit mappings
Third
Party
HealthVault
Provider
Disclosure
Auth
given by
used by attached to
Disclosure
Token
1
1
*
*
0..1 1
Patient
emits1
*
Allowed(pid,hid,discid,tpid,t)
nd the
t-based
eries, it
viola-
scharge
ned.
cations
Exam-
one in
ļ¬cation
Figure 4 focuses on the DisclosureAuth class and sur
relations (which implicitly includes also the endpoin
attached to those relations, given that UML univocall
the endpoint classes to each binary relation). Howeve
not mention directly the Patient class, nor the corre
emits relation. The underlying database schema intro
Example 1 actually provides us the raw data to cha
the extension of such elements: it is enough to in
Allowed relation and ļ¬lter it by retaining the pid an
ļ¬elds. We can then construct the following mapping
SELECT pid,discid FROM Allowed
emits(pat(pid), dtoken(discid))
QUEN components
temporal
SPARQL
DB schema
Static upper KBā€Ø
(agents/norms) Dynamic upper KBā€Ø
(norm states)Domain-speciļ¬cā€Ø
KB
Mappings
Norm state transitions
speciļ¬cation
QUEN components
temporal
SPARQL
DB schema
Static upper KBā€Ø
(agents/norms) Dynamic upper KBā€Ø
(norm states)Domain-speciļ¬cā€Ø
KB
Mappings
Norm state transitions
speciļ¬cation
DiscloseAuth(x)
^ Detached(x)[t1, t2)
QUEN components
temporal
SPARQL
DB schema
Static upper KBā€Ø
(agents/norms) Dynamic upper KBā€Ø
(norm states)Domain-speciļ¬cā€Ø
KB
Mappings
Norm state transitions
speciļ¬cation
DiscloseAuth(x)
^ Detached(x)[t1, t2)
?
Motivation Semantic Web OBDA Framework References
Query answering by rewriting (conceptual framework)
Ontology
Mappings
Data
Sources
. . .
. . .
. . .
. . .
qresult
Ontology-based data access
Motivation Semantic Web OBDA Framework References
Query answering by rewriting (conceptual framework)
Ontology
Mappings
Data
Sources
. . .
. . .
. . .
. . .
Ontological Query q
Rewritten Query
SQLRelational Answer
Ontological Answer
Rewriting
Unfolding
Evaluation
Result Translation
Ontology-based data access
Temporal OBDA
Extension of the classical OBDA paradigm with (metric) time

ā€¢ Facts have an attached time interval.

ā€¢ Static ontology: OWL 2 QL.

ā€¢ Temporal ontology: non-recursive Datalog extended with
metric temporal logic operators.

ā€¢ Temporal mappings indicate how to extract facts and their
interval extreme timestamps from the underlying database.

ā€¢ Support for temporal SPARQL.

ā€¢ Ongoing implementation eļ¬€ort inside Ontop.
Making QUEN Operational
temporal
SPARQL
DB schema
Static upper KBā€Ø
(agents/norms) Dynamic upper KBā€Ø
(norm states)Domain-speciļ¬cā€Ø
KB
Mappings
Norm state transitions
speciļ¬cation
Making QUEN Operational
temporal
SPARQL
DB schema
Static OWL 2 QL
ontology
Basic temporal
ontology
Mappings
Norm state transitions
speciļ¬cation
Making QUEN Operational
temporal
SPARQL
DB schema
Mappings
Norm state transitions
speciļ¬cation
Automatic
mapping
encoder
Static OWL 2 QL
ontology
Basic temporal
ontology
Making QUEN Operational
temporal
SPARQL
DB schema
Mappings Temporal mappings
Automatic
mapping
encoder
Static OWL 2 QL
ontology
Basic temporal
ontology
Making QUEN Operational
temporal
SPARQL
DB schema
Mappings Temporal mappings
Static OWL 2 QL
ontology
Basic temporal
ontology
Temporal
OBDA
Debugging
QUEN speciļ¬cation of norm lifecycle may be wrong:

ā€¢ Ambiguous transition: multiple timestamps. ā€Ø
Violates functionality on timestamp attribute.

ā€¢ State superposition: norm in two states at the same time.

We cannot reason on this in general, but we can debug
whether such issues arise given a database:

ā€¢ Transform these checks into queries.

ā€¢ If answers returned -> issue.

Example: fetch norms that are simultaneously discharged
and violatedā€¦
TOBDA framework to have a ļ¬ne-grained understanding of
such a root cause, using standard techniques [13]. Speciļ¬cally,
it is possible to automatically construct a SQL query that,
once submitted to the underlying database, returns those norm
instances that have at least two creation times (and similarly
for the other time attributes).
The case of state superposition can instead be simply
handled by formulating suitable semantic queries that retrieve
those norm instances that are simultaneously present in two
states. By inspecting the temporal mappings, a case of state
superposition can only arise if the norm instance simultane-
ously undergoes a transition to two different states. Hence, to
retrieve all norm instances that experienced a superposition
of state violated and discharged (and when this undesired
superposition arose), we can issue the following query:
Qdv(n, t) = violated(n)@[t, t1) āˆ§ discharged(n)@[t, t2)
Conclusion
QUEN framework:

ā€¢ Relational modeling of norms and their evolution at
the ontological level.

ā€¢ Conceptual link to underlying legacy DB.

ā€¢ Operational thanks to automated encoding to
temporal OBDA: ā€œvirtual norm state storeā€.

ā€¢ Example of OBDA with a ļ¬xed target ontology.

Future work:

ā€¢ Implementation (ongoing eļ¬€ort).

ā€¢ From oļ¬„ine to online: streaming and operational
support!
M
Marco
Montali
montali@inf.unibz.it
Thanks!

More Related Content

Similar to Representing and Querying Norm States Using Temporal Ontology-Based Data Access

Credit Default Swap (CDS) Rate Construction by Machine Learning Techniques
Credit Default Swap (CDS) Rate Construction by Machine Learning TechniquesCredit Default Swap (CDS) Rate Construction by Machine Learning Techniques
Credit Default Swap (CDS) Rate Construction by Machine Learning TechniquesZhongmin Luo
Ā 
DEVNET-1163 Data in Motion APIs
DEVNET-1163	Data in Motion APIsDEVNET-1163	Data in Motion APIs
DEVNET-1163 Data in Motion APIsCisco DevNet
Ā 
It's all About the Data
It's all About the DataIt's all About the Data
It's all About the DataXavier Amatriain
Ā 
basil.pptx
basil.pptxbasil.pptx
basil.pptxYongraeJo
Ā 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesNECST Lab @ Politecnico di Milano
Ā 
Data Mining to Classify Telco Churners
Data Mining to Classify Telco ChurnersData Mining to Classify Telco Churners
Data Mining to Classify Telco ChurnersMohitMhapuskar
Ā 
Data Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive Data
Data Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive DataData Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive Data
Data Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive DataDATAVERSITY
Ā 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesNECST Lab @ Politecnico di Milano
Ā 
BigDansing presentation slides for SIGMOD 2015
BigDansing presentation slides for SIGMOD 2015BigDansing presentation slides for SIGMOD 2015
BigDansing presentation slides for SIGMOD 2015Zuhair khayyat
Ā 
Requirements Management - Managing Scope
Requirements Management - Managing ScopeRequirements Management - Managing Scope
Requirements Management - Managing ScopeChristianKobsa
Ā 
Quality By Design
Quality By DesignQuality By Design
Quality By Designrealmayank
Ā 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxduketjoy27252
Ā 
Apoorva Javadekar -Role of Reputation For Mutual Fund Flows
Apoorva Javadekar -Role of Reputation For Mutual Fund FlowsApoorva Javadekar -Role of Reputation For Mutual Fund Flows
Apoorva Javadekar -Role of Reputation For Mutual Fund FlowsApoorva Javadekar
Ā 
Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...
Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...
Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...Tommy Vandepitte
Ā 
PREPAYMENT METER_PRESENTATION_Don Taylor.pdf
PREPAYMENT METER_PRESENTATION_Don Taylor.pdfPREPAYMENT METER_PRESENTATION_Don Taylor.pdf
PREPAYMENT METER_PRESENTATION_Don Taylor.pdfcollet ndlovu
Ā 
Multiple objectives in Collaborative Filtering (RecSys 2010)
Multiple objectives in Collaborative Filtering (RecSys 2010)Multiple objectives in Collaborative Filtering (RecSys 2010)
Multiple objectives in Collaborative Filtering (RecSys 2010)Tamas Jambor
Ā 
Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...Institute for Transport Studies (ITS)
Ā 
Performance evaluation of IR models
Performance evaluation of IR modelsPerformance evaluation of IR models
Performance evaluation of IR modelsNisha Arankandath
Ā 
Semantic Integration of Patient Data and Quality Indicators based on openEHR ...
Semantic Integration of Patient Data and Quality Indicators based on openEHR ...Semantic Integration of Patient Data and Quality Indicators based on openEHR ...
Semantic Integration of Patient Data and Quality Indicators based on openEHR ...Kathrin Dentler
Ā 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on querieskavidhapr
Ā 

Similar to Representing and Querying Norm States Using Temporal Ontology-Based Data Access (20)

Credit Default Swap (CDS) Rate Construction by Machine Learning Techniques
Credit Default Swap (CDS) Rate Construction by Machine Learning TechniquesCredit Default Swap (CDS) Rate Construction by Machine Learning Techniques
Credit Default Swap (CDS) Rate Construction by Machine Learning Techniques
Ā 
DEVNET-1163 Data in Motion APIs
DEVNET-1163	Data in Motion APIsDEVNET-1163	Data in Motion APIs
DEVNET-1163 Data in Motion APIs
Ā 
It's all About the Data
It's all About the DataIt's all About the Data
It's all About the Data
Ā 
basil.pptx
basil.pptxbasil.pptx
basil.pptx
Ā 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Ā 
Data Mining to Classify Telco Churners
Data Mining to Classify Telco ChurnersData Mining to Classify Telco Churners
Data Mining to Classify Telco Churners
Ā 
Data Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive Data
Data Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive DataData Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive Data
Data Quality Challenges & Solution Approaches in Yahoo!ā€™s Massive Data
Ā 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Ā 
BigDansing presentation slides for SIGMOD 2015
BigDansing presentation slides for SIGMOD 2015BigDansing presentation slides for SIGMOD 2015
BigDansing presentation slides for SIGMOD 2015
Ā 
Requirements Management - Managing Scope
Requirements Management - Managing ScopeRequirements Management - Managing Scope
Requirements Management - Managing Scope
Ā 
Quality By Design
Quality By DesignQuality By Design
Quality By Design
Ā 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Ā 
Apoorva Javadekar -Role of Reputation For Mutual Fund Flows
Apoorva Javadekar -Role of Reputation For Mutual Fund FlowsApoorva Javadekar -Role of Reputation For Mutual Fund Flows
Apoorva Javadekar -Role of Reputation For Mutual Fund Flows
Ā 
Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...
Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...
Data Protection Compliance Check - Outsourcing - Part 2 "Paper" (C2P relation...
Ā 
PREPAYMENT METER_PRESENTATION_Don Taylor.pdf
PREPAYMENT METER_PRESENTATION_Don Taylor.pdfPREPAYMENT METER_PRESENTATION_Don Taylor.pdf
PREPAYMENT METER_PRESENTATION_Don Taylor.pdf
Ā 
Multiple objectives in Collaborative Filtering (RecSys 2010)
Multiple objectives in Collaborative Filtering (RecSys 2010)Multiple objectives in Collaborative Filtering (RecSys 2010)
Multiple objectives in Collaborative Filtering (RecSys 2010)
Ā 
Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...Evaluation of transport safety policies in commercial motorcycle operation in...
Evaluation of transport safety policies in commercial motorcycle operation in...
Ā 
Performance evaluation of IR models
Performance evaluation of IR modelsPerformance evaluation of IR models
Performance evaluation of IR models
Ā 
Semantic Integration of Patient Data and Quality Indicators based on openEHR ...
Semantic Integration of Patient Data and Quality Indicators based on openEHR ...Semantic Integration of Patient Data and Quality Indicators based on openEHR ...
Semantic Integration of Patient Data and Quality Indicators based on openEHR ...
Ā 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
Ā 

More from Faculty of Computer Science - Free University of Bozen-Bolzano

More from Faculty of Computer Science - Free University of Bozen-Bolzano (20)

From Case-Isolated to Object-Centric Processes - A Tale of two Models
From Case-Isolated to Object-Centric Processes - A Tale of two ModelsFrom Case-Isolated to Object-Centric Processes - A Tale of two Models
From Case-Isolated to Object-Centric Processes - A Tale of two Models
Ā 
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic SettingReasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting
Ā 
Constraints for Process Framing in Augmented BPM
Constraints for Process Framing in Augmented BPMConstraints for Process Framing in Augmented BPM
Constraints for Process Framing in Augmented BPM
Ā 
Intelligent Systems for Process Mining
Intelligent Systems for Process MiningIntelligent Systems for Process Mining
Intelligent Systems for Process Mining
Ā 
Declarative process mining
Declarative process miningDeclarative process mining
Declarative process mining
Ā 
Process Reasoning and Mining with Uncertainty
Process Reasoning and Mining with UncertaintyProcess Reasoning and Mining with Uncertainty
Process Reasoning and Mining with Uncertainty
Ā 
From Case-Isolated to Object-Centric Processes
From Case-Isolated to Object-Centric ProcessesFrom Case-Isolated to Object-Centric Processes
From Case-Isolated to Object-Centric Processes
Ā 
Modeling and Reasoning over Declarative Data-Aware Processes
Modeling and Reasoning over Declarative Data-Aware ProcessesModeling and Reasoning over Declarative Data-Aware Processes
Modeling and Reasoning over Declarative Data-Aware Processes
Ā 
Soundness of Data-Aware Processes with Arithmetic Conditions
Soundness of Data-Aware Processes with Arithmetic ConditionsSoundness of Data-Aware Processes with Arithmetic Conditions
Soundness of Data-Aware Processes with Arithmetic Conditions
Ā 
Probabilistic Trace Alignment
Probabilistic Trace AlignmentProbabilistic Trace Alignment
Probabilistic Trace Alignment
Ā 
Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors
Strategy Synthesis for Data-Aware Dynamic Systems with Multiple ActorsStrategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors
Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors
Ā 
Extending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with UncertaintyExtending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with Uncertainty
Ā 
Extending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with UncertaintyExtending Temporal Business Constraints with Uncertainty
Extending Temporal Business Constraints with Uncertainty
Ā 
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Modeling and Reasoning over Declarative Data-Aware Processes with Object-Cent...
Ā 
From legacy data to event data
From legacy data to event dataFrom legacy data to event data
From legacy data to event data
Ā 
Putting Decisions in Perspective(s)
Putting Decisions in Perspective(s)Putting Decisions in Perspective(s)
Putting Decisions in Perspective(s)
Ā 
Enriching Data Models with Behavioral Constraints
Enriching Data Models with Behavioral ConstraintsEnriching Data Models with Behavioral Constraints
Enriching Data Models with Behavioral Constraints
Ā 
Compliance monitoring of multi-perspective declarative process models
Compliance monitoring of multi-perspective declarative process modelsCompliance monitoring of multi-perspective declarative process models
Compliance monitoring of multi-perspective declarative process models
Ā 
Processes and organizations - a look behind the paper wall
Processes and organizations - a look behind the paper wallProcesses and organizations - a look behind the paper wall
Processes and organizations - a look behind the paper wall
Ā 
Formal modeling and SMT-based parameterized verification of Data-Aware BPMN
Formal modeling and SMT-based parameterized verification of Data-Aware BPMNFormal modeling and SMT-based parameterized verification of Data-Aware BPMN
Formal modeling and SMT-based parameterized verification of Data-Aware BPMN
Ā 

Recently uploaded

Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”
Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”
Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”soniya singh
Ā 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
Ā 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
Ā 
WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )
WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )
WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )Pooja Nehwal
Ā 
Russian Call Girls in Kolkata Vaishnavi šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
Ā 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
Ā 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
Ā 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
Ā 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
Ā 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
Ā 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
Ā 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
Ā 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
Ā 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
Ā 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
Ā 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
Ā 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
Ā 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
Ā 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
Ā 

Recently uploaded (20)

Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”
Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”
Call Girls in Sarojini Nagar Market Delhi šŸ’Æ Call Us šŸ”8264348440šŸ”
Ā 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Ā 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
Ā 
WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )
WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )
WhatsApp šŸ“ž 9892124323 āœ…Call Girls In Juhu ( Mumbai )
Ā 
Russian Call Girls in Kolkata Vaishnavi šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
Ā 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Ā 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
Ā 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Ā 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Ā 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
Ā 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
Ā 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Ā 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Ā 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
Ā 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
Ā 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
Ā 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
Ā 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
Ā 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Ā 

Representing and Querying Norm States Using Temporal Ontology-Based Data Access

  • 1. Representing and Querying Norm Statesā€Ø Using Temporal Ontology-Based Data Access Evellin Cardoso, Marco Montali, Diego Calvaneseā€Ø Free University of Bozen-Bolzano, Italy
  • 6. Governancemodel- driven data- driven Governance Workforce contract z Is delivery 123 still pending? Which commitments did we violate in 2018? customer manager
  • 7. Governancemodel- driven data- driven Governance Workforce contract z Is delivery 123 still pending? Which commitments did we violate in 2018? customer manager Problem #1 How to represent relational normative primitives and their evolution
  • 8. Governancemodel- driven data- driven Governance Workforce contract Is delivery 123 still pending? Which commitments did we violate in 2018? customer managerqueries
  • 9. Governancemodel- driven data- driven Governance Workforce contract norm states Is delivery 123 still pending? Which commitments did we violate in 2019? customer managerqueries extension of answers
  • 10. Governancemodel- driven data- driven Governance Workforce contract norm states Is delivery 123 still pending? Which commitments did we violate in 2019? customer managerqueries extension of answers Problem #2 How to compute norm instances and their states from legacy data
  • 11. Governancemodel- driven data- driven Governance Workforce contract norm states Is delivery 123 still pending? Which commitments did we violate in 2019? customer managerqueries extension of answers Problem #2 How to compute norm instances and their states from legacy relational data without materializing
  • 12. Outline 1. Example (data consent) 2. The QUEN framework as a black box 3. The QUEN framework as a white box
  • 13. Example: ā€Ø access consent to patient data patient health vault provider third-parties
  • 14. Example: ā€Ø access consent to patient data patient health vault provider third-parties allow disclosure token Allowed(pid,hid,discid,tpid,t)
  • 15. Example: ā€Ø access consent to patient data patient health vault provider third-parties send creds disclosure token allow SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t)
  • 16. Example: ā€Ø access consent to patient data patient health vault provider third-parties send creds disclosure token allow SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t) ReqData(tpid,hid,reqid,discid,t) request
  • 17. Example: ā€Ø access consent to patient data patient health vault provider third-parties send creds disclosure token allow SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t) request ReqData(tpid,hid,reqid,discid,t) Accessed(tpid,hid,reqid,discid,t) access
  • 18. Example: ā€Ø access consent to patient data SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t) ReqData(tpid,hid,reqid,discid,t) Accessed(tpid,hid,reqid,discid,t) Who are the involved agents? Where is the notion of ā€œdisclose authorizationā€? How many authorizations have been created? What is their current status? Is third-party xyz authorised now to access certain data?
  • 19. QUEN in a nutshell ā€¢ Full relational (ļ¬rst-order) modeling of norms. ā€¢ Three conceptual layers: 1. Ontological layer of norms: norms as explicit relations. 2. Norm state evolution: declarative speciļ¬cation of norm state transitions as induced by the raw database facts. 3. Legacy relational database: tuples with timestamps as implicit events. ā€¢ ā€œVirtual norm storeā€: ā€¢ data; ā€¢ queries and answers.
  • 20. QUEN in a nutshell ā€¢ Full relational (ļ¬rst-order) modeling of norms. ā€¢ Three conceptual layers: 1. Ontological layer of norms: norms as explicit relations. 2. Norm state evolution: declarative speciļ¬cation of norm state transitions as induced by the raw facts in the data 3. Legacy relational database: tuples with timestamps as implicit events. ā€¢ ā€œVirtual norm storeā€: ā€¢ data; ā€¢ queries and answers.
  • 21. Upper knowledge - crt: timestamp - ext: timestamp [0..1] - det: timestamp [0..1] - dit: timestamp [0..1] Normative Primitive Authorization Prohibition Power is expector for Commitment Agent is expectee for Thing 1 1 * * * 1 targets - vit: timestamp [0..1] Violable Normative Primitive Static Dynamic
  • 22. Upper knowledge - crt: timestamp - ext: timestamp [0..1] - det: timestamp [0..1] - dit: timestamp [0..1] Normative Primitive Authorization Prohibition Power is expector for Commitment Agent is expectee for Thing 1 1 * * * 1 targets - vit: timestamp [0..1] Violable Normative Primitive Static Dynamic
  • 23. created detachedexpired dischargedviolated create when ante detach when never ante expire when cons discharge when cons dischargewhen never cons violate Figure 1: Lifecycle of norm types (from [9]). The violated state e only for prohibition and commitment. a timestamp column, and whose tuples record the diffe instances recorded in the system for that event. Example 1 (Inspired from [9]). The following informa schema captures three event types related to the request access to patient data within a sanitary organization, where Upper knowledge - crt: timestamp - ext: timestamp [0..1] - det: timestamp [0..1] - dit: timestamp [0..1] Normative Primitive Authorization Prohibition Power is expector for Commitment Agent is expectee for Thing 1 1 * * * 1 targets - vit: timestamp [0..1] Violable Normative Primitive Static Dynamic
  • 24. Step 1/3: Domain-speciļ¬c norm types - crt: timestamp - ext: timestamp [0..1] - det: timestamp [0..1] - dit: timestamp [0..1] Normative Primitive Authorization Prohibition Power Third Party HealthVault Provider is expector for Commitment Disclosure Auth Agent is expectee for given by used by attached to Disclosure Token Thing 1 1 * * * 1 targets - vit: timestamp [0..1] Violable Normative Primitive 1 1 * * 0..1 1 Patient emits1 *
  • 25. Step 1/3: Domain-speciļ¬c norm types - crt: timestamp - ext: timestamp [0..1] - det: timestamp [0..1] - dit: timestamp [0..1] Normative Primitive Authorization Prohibition Power Third Party HealthVault Provider is expector for Commitment Disclosure Auth Agent is expectee for given by used by attached to Disclosure Token Thing 1 1 * * * 1 targets - vit: timestamp [0..1] Violable Normative Primitive 1 1 * * 0..1 1 Patient emits1 * - crt: timestamp - ext: timestamp [0..1] - det: timestamp [0..1] - dit: timestamp [0..1] Normative Primitive Authorization Prohibition Power Third Party HealthVault Provider is expector for Commitment Disclosure Auth Agent is expectee for given by used by attached to Disclosure Token Thing 1 1 * * * 1 targets - vit: timestamp [0..1] Violable Normative Primitive 1 1 * * 0..1 1 Patient emits1 *
  • 26. Step 2/3: Norm State Transitions We take inspiration from Custard [Chopra and Singh, AAMAS 2016]. Each norm type N in the lower ontology comes with a corresponding QUEN speciļ¬cation: and is a sub-relation of the expector relation in On (thus qualifying the domain-speciļ¬c expector for N); ā€¢ Rc be a domain-speciļ¬c relation that is attached to N and is a sub-relation of the expectee relation in On (thus qualifying the domain-speciļ¬c expectee for N); ā€¢ Rt be a domain-speciļ¬c relationship that is attached to N and is a sub-relation of the target relation in On (thus qualifying the domain-speciļ¬c target for N). A QUEN lifecycle speciļ¬cation for this combination of ele- ments has the following form: T N Rd d Rc c Rt o create Qcr (d, c, o, tcr) expire Qex d,c,o,tcr (tex) detach Qde d,c,o,tcr (tde) discharge Qdi d,c,o,tcr,tde (tdi) [violate Qvi d,c,o,tcr,tde (tvi) ] where the last line is only present if T āˆˆ
  • 27. We take inspiration from Custard [Chopra and Singh, AAMAS 2016]. Each norm type N in the lower ontology comes with a corresponding QUEN speciļ¬cation: and is a sub-relation of the expector relation in On (thus qualifying the domain-speciļ¬c expector for N); ā€¢ Rc be a domain-speciļ¬c relation that is attached to N and is a sub-relation of the expectee relation in On (thus qualifying the domain-speciļ¬c expectee for N); ā€¢ Rt be a domain-speciļ¬c relationship that is attached to N and is a sub-relation of the target relation in On (thus qualifying the domain-speciļ¬c target for N). A QUEN lifecycle speciļ¬cation for this combination of ele- ments has the following form: T N Rd d Rc c Rt o create Qcr (d, c, o, tcr) expire Qex d,c,o,tcr (tex) detach Qde d,c,o,tcr (tde) discharge Qdi d,c,o,tcr,tde (tdi) [violate Qvi d,c,o,tcr,tde (tvi) ] where the last line is only present if T āˆˆ Static/dynamic KB Relational DB Step 2/3: Norm Lifecycle
  • 28. Third Party HealthVault Provider Disclosure Auth given by used by attached to Disclosure Token 1 1 * * 0..1 1 Patient emits1 * SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t) ReqData(tpid,hid,reqid,discid,t) Accessed(tpid,hid,reqid,discid,t) Step 2/3: Norm Lifecycle
  • 29. Third Party HealthVault Provider Disclosure Auth given by used by attached to Disclosure Token 1 1 * * 0..1 1 Patient emits1 * authorization DisclosureAuth used by tp given by h attached to d create SELECT c.tpid AS tp, c.hid AS h, c.discid AS d, c.t AS tcr FROM SentCred c, Allowed a WHERE c.discid = a.discid AND c.tpid = a.tpid AND c.hid = a.hid detach SELECT r.t AS tde FROM ReqData r WHERE r.discid = d AND r.t > tcr discharge SELECT a.t AS tdi FROM Accessed a WHERE a.discid = d AND a.t ā‰„ tde + 1 AND a.t ā‰¤ tde + 10 Figure 4: QUEN lifecycle speciļ¬cation of the disclosure authorization on top of the database schema of Example 1. where object constructors simply use (abbreviations of) the names of the corresponding endpoint classes. Notice that this mapping also implicitly populate the Patient class with pat(pid), given that the domain of emits is Patient as dictated by the ontology. ā–¹ D. Putting Everything Together A. From Lifecycle Speciļ¬cations to Mappings As a preliminary step for the translation, we need to d how a query with parameters can be suitably merge w query providing those parameters, so as to obtain a stan SQL query as result. This is done by simply computing join (in the standard SQL sense). Speciļ¬cally, let Q1 (āƒ—x, t1) be a query without paramete SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t) ReqData(tpid,hid,reqid,discid,t) Accessed(tpid,hid,reqid,discid,t) Step 2/3: Norm Lifecycle
  • 30. Third Party HealthVault Provider Disclosure Auth given by used by attached to Disclosure Token 1 1 * * 0..1 1 Patient emits1 * authorization DisclosureAuth used by tp given by h attached to d create SELECT c.tpid AS tp, c.hid AS h, c.discid AS d, c.t AS tcr FROM SentCred c, Allowed a WHERE c.discid = a.discid AND c.tpid = a.tpid AND c.hid = a.hid detach SELECT r.t AS tde FROM ReqData r WHERE r.discid = d AND r.t > tcr discharge SELECT a.t AS tdi FROM Accessed a WHERE a.discid = d AND a.t ā‰„ tde + 1 AND a.t ā‰¤ tde + 10 Figure 4: QUEN lifecycle speciļ¬cation of the disclosure authorization on top of the database schema of Example 1. where object constructors simply use (abbreviations of) the names of the corresponding endpoint classes. Notice that this mapping also implicitly populate the Patient class with pat(pid), given that the domain of emits is Patient as dictated by the ontology. ā–¹ D. Putting Everything Together A. From Lifecycle Speciļ¬cations to Mappings As a preliminary step for the translation, we need to d how a query with parameters can be suitably merge w query providing those parameters, so as to obtain a stan SQL query as result. This is done by simply computing join (in the standard SQL sense). Speciļ¬cally, let Q1 (āƒ—x, t1) be a query without paramete SentCred(hid,tpid,discid,t) Allowed(pid,hid,discid,tpid,t) ReqData(tpid,hid,reqid,discid,t) Accessed(tpid,hid,reqid,discid,t) Step 2/3: Norm Lifecycle
  • 31. Step 3/3: Add explicit mappings Third Party HealthVault Provider Disclosure Auth given by used by attached to Disclosure Token 1 1 * * 0..1 1 Patient emits1 * Allowed(pid,hid,discid,tpid,t)
  • 32. Step 3/3: Add explicit mappings Third Party HealthVault Provider Disclosure Auth given by used by attached to Disclosure Token 1 1 * * 0..1 1 Patient emits1 * Allowed(pid,hid,discid,tpid,t)
  • 33. Step 3/3: Add explicit mappings Third Party HealthVault Provider Disclosure Auth given by used by attached to Disclosure Token 1 1 * * 0..1 1 Patient emits1 * Allowed(pid,hid,discid,tpid,t) nd the t-based eries, it viola- scharge ned. cations Exam- one in ļ¬cation Figure 4 focuses on the DisclosureAuth class and sur relations (which implicitly includes also the endpoin attached to those relations, given that UML univocall the endpoint classes to each binary relation). Howeve not mention directly the Patient class, nor the corre emits relation. The underlying database schema intro Example 1 actually provides us the raw data to cha the extension of such elements: it is enough to in Allowed relation and ļ¬lter it by retaining the pid an ļ¬elds. We can then construct the following mapping SELECT pid,discid FROM Allowed emits(pat(pid), dtoken(discid))
  • 34. QUEN components temporal SPARQL DB schema Static upper KBā€Ø (agents/norms) Dynamic upper KBā€Ø (norm states)Domain-speciļ¬cā€Ø KB Mappings Norm state transitions speciļ¬cation
  • 35. QUEN components temporal SPARQL DB schema Static upper KBā€Ø (agents/norms) Dynamic upper KBā€Ø (norm states)Domain-speciļ¬cā€Ø KB Mappings Norm state transitions speciļ¬cation DiscloseAuth(x) ^ Detached(x)[t1, t2)
  • 36. QUEN components temporal SPARQL DB schema Static upper KBā€Ø (agents/norms) Dynamic upper KBā€Ø (norm states)Domain-speciļ¬cā€Ø KB Mappings Norm state transitions speciļ¬cation DiscloseAuth(x) ^ Detached(x)[t1, t2) ?
  • 37. Motivation Semantic Web OBDA Framework References Query answering by rewriting (conceptual framework) Ontology Mappings Data Sources . . . . . . . . . . . . qresult Ontology-based data access
  • 38. Motivation Semantic Web OBDA Framework References Query answering by rewriting (conceptual framework) Ontology Mappings Data Sources . . . . . . . . . . . . Ontological Query q Rewritten Query SQLRelational Answer Ontological Answer Rewriting Unfolding Evaluation Result Translation Ontology-based data access
  • 39. Temporal OBDA Extension of the classical OBDA paradigm with (metric) time ā€¢ Facts have an attached time interval. ā€¢ Static ontology: OWL 2 QL. ā€¢ Temporal ontology: non-recursive Datalog extended with metric temporal logic operators. ā€¢ Temporal mappings indicate how to extract facts and their interval extreme timestamps from the underlying database. ā€¢ Support for temporal SPARQL. ā€¢ Ongoing implementation eļ¬€ort inside Ontop.
  • 40. Making QUEN Operational temporal SPARQL DB schema Static upper KBā€Ø (agents/norms) Dynamic upper KBā€Ø (norm states)Domain-speciļ¬cā€Ø KB Mappings Norm state transitions speciļ¬cation
  • 41. Making QUEN Operational temporal SPARQL DB schema Static OWL 2 QL ontology Basic temporal ontology Mappings Norm state transitions speciļ¬cation
  • 42. Making QUEN Operational temporal SPARQL DB schema Mappings Norm state transitions speciļ¬cation Automatic mapping encoder Static OWL 2 QL ontology Basic temporal ontology
  • 43. Making QUEN Operational temporal SPARQL DB schema Mappings Temporal mappings Automatic mapping encoder Static OWL 2 QL ontology Basic temporal ontology
  • 44. Making QUEN Operational temporal SPARQL DB schema Mappings Temporal mappings Static OWL 2 QL ontology Basic temporal ontology Temporal OBDA
  • 45. Debugging QUEN speciļ¬cation of norm lifecycle may be wrong: ā€¢ Ambiguous transition: multiple timestamps. ā€Ø Violates functionality on timestamp attribute. ā€¢ State superposition: norm in two states at the same time. We cannot reason on this in general, but we can debug whether such issues arise given a database: ā€¢ Transform these checks into queries. ā€¢ If answers returned -> issue. Example: fetch norms that are simultaneously discharged and violatedā€¦ TOBDA framework to have a ļ¬ne-grained understanding of such a root cause, using standard techniques [13]. Speciļ¬cally, it is possible to automatically construct a SQL query that, once submitted to the underlying database, returns those norm instances that have at least two creation times (and similarly for the other time attributes). The case of state superposition can instead be simply handled by formulating suitable semantic queries that retrieve those norm instances that are simultaneously present in two states. By inspecting the temporal mappings, a case of state superposition can only arise if the norm instance simultane- ously undergoes a transition to two different states. Hence, to retrieve all norm instances that experienced a superposition of state violated and discharged (and when this undesired superposition arose), we can issue the following query: Qdv(n, t) = violated(n)@[t, t1) āˆ§ discharged(n)@[t, t2)
  • 46. Conclusion QUEN framework: ā€¢ Relational modeling of norms and their evolution at the ontological level. ā€¢ Conceptual link to underlying legacy DB. ā€¢ Operational thanks to automated encoding to temporal OBDA: ā€œvirtual norm state storeā€. ā€¢ Example of OBDA with a ļ¬xed target ontology. Future work: ā€¢ Implementation (ongoing eļ¬€ort). ā€¢ From oļ¬„ine to online: streaming and operational support!